SULIT
F5108
ARAHAN : Jawab EMPAT(4) dari ENAM(6) soalan
INSTRUCTION : Answer FOUR(4) out of SIX(6) questions.
SOALAN 1
a.
Berikan takrifan keselamatan rangkaian.
b.
Jelaskan analisa ancaman berikut:.
c.
d.
i.
Asset Identification
ii.
Vulnerability Assessment
iii.
Threat Identification
(2 markah)
(9 markah)
Kenalpasti kelemahan utama didalam keselamatan rangkaian:
i.
Technology Weaknesses
ii.
Security Policy Weaknesses
iii.
Configuration Weaknesses
Bezakan antara White Hackers dan Black Hackers
(9 markah)
(5 markah)
QUESTION 1
a.
Give a definition for network security.
b.
Describe the following threats analysis.
c.
d.
i.
Asset Identification
ii.
Vulnerability Assessment
iii.
Threat Identification
(2 marks)
(9 marks)
Identify the primary weaknesses in the network security :
i.
Technology Weaknesses
ii.
Security Policy Weaknesses
iii.
Configuration Weaknesses
(9 marks)
Differenciate between White Hackers and Black Hackers
(5 marks)
SULIT
F5108
SOALAN 2
a.
Ilustrasikan dengan sebuah carta alir, terangkan kaedah CSMA/CD.
(5 markah)
b.
Berikan definisi Ethernet switching table.
(5 markah)
c.
Berikan kelebihan ATM (Asynchronous Transfer Mode) dan kelemahan
Frame Relay.
d.
(10 markah)
Berikan definisi dan kenalpasti spesifikasi Leased line.
(5 markah)
QUESTION 2
a.
Ilustrate with a flowchart, the CSMA/CD method.
b.
Define Ethernet switching table.
c.
Give the advantages of ATM (Asynchronous Transfer Mode) and
(5 marks)
(5 marks)
disadvantages of Frame Relay.
d.
(10 marks)
Define and identify the specifications of Leased line.
(5 marks)
SULIT
F5108
SOALAN 3
a.
Apakah yang dimaksudkan dengan sebuah VLAN.
(5 markah)
b.
Bagaimanakah keselamatan dapat diceroboh dalam sebuah VLAN.
(5 markah)
c.
Apakah yang dimaksudkan dengan routing?
(5 markah)
d.
Nyatakan serta terangkan DUA (2) aktiviti yang berkaitan dengan routing.
(7 markah)
e.
Bagaimana routing tables boleh digunakan untuk menentukan peralihan data yang
optima?
(3 markah)
QUESTION 3
a.
Define the meaning of a VLAN.
(5 marks)
b.
How can security be breached in a VLAN?
(5 marks)
c.
What does routing mean?
(5 marks)
d.
List and explain the TWO (2) activities involved in routing.
(7 marks)
e.
How can routing tables be use to determine the datas optimal path?
(3 marks)
SULIT
F5108
SOALAN 4
a.
Apakah yang dimaksudkan firewall.
b.
Terangkan variasi pakej produk firewall .
i.
ii.
iii.
iv.
c.
d.
(2 markah)
Appliance-based firewalls
Server-based firewalls
Integrated Firewalls
Personal firewalls
(8 markah)
Terangkan TIGA (3) teknik yang biasa oleh firewalls didalam
melindungi persekitaran rangkaian.
(9 markah)
Huraikan perbezaan antara virus, trojans horse dan worms.
(6 markah)
QUESTION 4
a.
What is a firewall?
b.
Explain the various package of Firewall products.
i.
ii.
iii.
iv.
c.
d.
(2 marks)
Appliance-based firewalls
Server-based firewalls
Integrated Firewalls
Personal firewalls
(8 marks)
Explain the THREE (3) common techniques in a firewalls in order to
protected the networking environment.
(9 marks)
Explain the difference between virus, trojans horse and worms
(6 marks)
SULIT
F5108
SOALAN 5
a.
Kenalpasti bagaimana implimentasi System Policy berikut boleh membantu dalam
keselmatan rangkaian:
i.
ii.
iii.
iv.
b.
Password
Accounts
Audit
User rights
(10 markah)
Bagaimanakah pengendalian system updates dan hotfixes dapat membantu dalam
membenteras serangan?
(5 markah)
c.
Nyatakan LIMA (5) kekurangan Internet Information Services.
(5 markah)
d.
Kenalpasti cir-ciri utama Microsoft Security Server.
(5 markah)
QUESTION 5
a.
Identify how the implementation of the following System Policy can assit in network
security:
i.
Password
ii. Accounts
iii.
Audit
iv.
User rights
(10 marks)
b.
How can carrying out system updates and hotfixes help prevent attacks?
(5 marks)
c.
List FIVE (5) vulnerabilities of Internet Information Services.
(5 marks)
d.
Identify the main features of Microsoft Security Server
(5 marks)
SULIT
F5108
SOALAN 6
a)
Berikan difinisi istilah cryptographic berikut:
i)
ii)
iii)
iv)
Encryption
Ciphertext
Decryption
Crytanalysis
(10 markah)
b)
Bezakan antara cara enkripsi symmetric dan asymetric.
(5 markah)
c)
Terangkan bagiamana konfigurasi hardware dan functions berikut boleh membantu dalam
mengendalikan bencana:
i)
ii)
iii)
iv)
v)
UPS
RAID
Redundant servers
Clustering
Backup tape
(10 markah)
QUESTION 6
a)
Define the following cryptographic terminologies:
i.
ii.
iii.
iv.
Encryption
Ciphertext
Decryption
Crytanalysis
(10 marks)
b)
Differentiate between symmetric and asymetric encrption.
c)
Explain how the following hardware and configuration functions assist in handling server
disasters:
.
i.
UPS
ii.
RAID
iii.
Redundant servers
iv.
Clustering
v.
Backup tape
(10 marks)
(5 marks)